The (Sad) State of Internet Security

The Armor Techs' blog is full of posts discussing security and passwords, and this post is going to be in much of the same vein. The security of your data on the web is becoming (read: has always been) super important, and the companies we rely on to use our data fairly and transparently aren't upholding their end of the bargain. On top of that, there are countless people and companies participating in less-than-legal practices to obtain your data,...
Tuesday September 11th, 2018Read More
Optimizing Your Google Chrome Experience


The internet has become one of the biggest tools we use in our everyday lives, and what browser we use is how we experience everything the web has to offer. Google Chrome is one of the biggest and best browsers out now but like every other browser, it does have its issues. Here are a couple of extensions or plugins to help make your experience using Chrome even better. Also, above the description for these extensions is a link to download these from ...
Thursday September 6th, 2018Read More
The main idea I want to discuss in this post is what to do when your device is compromised. If you have been hacked or a virus has been found on your computer, make a list of all the recent passwords to accounts you may have used. Remove your computer or phone from any internet or data connection. Change any of those passwords to your accounts on a clean system for safety and security. Get your computer and phone fixed and follow safe internet practices.

1.  Ransom Message

There are t...
Friday August 31st, 2018Read More
Welcome to Donkey Kong Country

I find it extraordinarily hard to believe that this post is going to be foreign to anybody—with a series that's been around since 1994, most people reading this blog have had it around for a good chunk of their lives, and it's been everywhere. From the Super Nintendo Entertainment System (SNES) all the way to the Nintendo Switch, this series has been continually having us explore new worlds, find new secrets, and meeting new characters. And besides...
Wednesday August 29th, 2018Read More


What companies come to mind when you hear about autonomous robots? Tesla? Google? Well, there's another company coming out with some pretty fantastic tech in that area: Rolls-Royce. They have teamed up with Harvard University to develop robots modeled after cockroaches for repair. What use would a cockroach-sized robot have for an automotive manufacturer, you may ask? They are planning on using them for engine repair in airplanes, but that could just be the start of it.

People have be...
Tuesday August 21st, 2018Read More
A basic diagram of what Phishing boils down to.

What is it?

Phishing (pronounced "fishing") is the process of "fishing" for more information about a person, often by posing as a source they would have no qualms about giving it to. Since the inception of the consumer, internet phishing has gone hand in hand with it. And as the internet has advanced, so too has the complexity of these scams. It is not uncommon these days to get extremely convincing emails from these con-a...
Thursday August 16th, 2018Read More
A Quick Change Of Format

We've been watching the statistics on these security blog posts, and they are among our least read content, so we're going to mess with the content a little. Instead of taking more of a marketing/newsletter angle with it, let's get nitty gritty with some things we at Armor have actually encountered in the wild.

Today's topic is:

How Did They Get Into My Website,
And What Did They Do?

Did you know that you can put a PHP shell inside a JPEG fil...
Tuesday August 7th, 2018Read More


INTRODUCTION

Here’s a clever new twist on an old email scam that makes the con far more believable. The message claims to have been sent from a hacker who’s compromised your computer and used your webcam to record a video of you while you were watching porn. The sender threatens to release the video to all your contacts unless you pay a Bitcoin ransom. The new twist? The email references a real password previously tied to the recipient’s email address.

Example Sextort...
Wednesday August 1st, 2018Read More
The Four Phone Accessories You Should be Using

1. Durable Cases

The OtterBox Defender Series Case, shown in the color Vinyasa.

Even though many people are opting out of repairing their phones due to many cellular service providers offering free upgrades, phones are still typically a huge investment. With the iPhone 8 starting at $699 and the iPhone X a whopping $999, it’s no surprise people are dishing out extra money on protecting their investments. Two of the leaders, and arguab...
Tuesday July 31st, 2018Read More
Pixels, The Unit of Measurement

Pixels: smaller than the point of a needle, able to be nearly 200,000 different colors, and something you stare at basically all day. Pixels are everywhere, from your TV screen to the screen on your smartphone, and even the print on the business cards in your wallet. Each one of these displays is created through rows and columns of pixels. In each traditional pixel, there are three separate color values: Red, Blue, and Green (also known as RGB). These pixels ar...
Thursday July 26th, 2018Read More

Newer Archive Older